Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Critical Internet Infrastructure (Dagstuhl Seminar 13322)., , , , and . Dagstuhl Reports, 3 (8): 27-39 (2013)Wired/wireless Internet communications., , , and . Computer Communications, 29 (13-14): 2599-2600 (2006)A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing., , and . Computer Communications, 34 (7): 898-920 (2011)Validated Model-Based Performance Prediction of Multi-Core Software Routers., , , , and . Praxis der Informationsverarbeitung und Kommunikation, 37 (2): 93-107 (2014)PETFEN: A Performance Evaluation Tool for Flow-Level Network Modeling of Ethernet Networks., , and . VALUETOOLS, ICST, (2014)Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks., , , , and . GLOBECOM, page 64-69. IEEE, (2007)Network Calculus and mixed-integer LP applied to a switched aircraft cabin network., , , and . IWQoS, page 1-4. IEEE, (2012)Multipath FEC scheme for the ATM adaptation layer AAL5., , and . Broadband Communications, volume 121 of IFIP Conference Proceedings, page 234-246. Chapman & Hall, (1998)Adaptive Network Management for Safety-Critical Systems., , and . IM, page 25-30. IFIP, (2019)Multi-party authorization and conflict mediation for decentralized configuration management processes., , , and . IM, page 5-8. IFIP, (2019)